Imago Techmedia Ltd is registered in England and Wales under Company No. 04865455. VAT No. GB 843 8456 01
Registered Office: Bedford House, Fulham Green, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom
Business Address: Imago Techmedia, 2C Bedford House, Fulham Green, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom
Imago Techmedia is a subsidiary of Clarion Events Limited
Duo Security is a cloud-based Trusted Access provider protecting thousands of the world’s largest and fastest-growing companies and organizations, including University of York, Etsy, Facebook, K-Swiss, Paramount Pictures, Random House, Toyota, Twitter, Yelp, Zillow and more. Duo’s innovative and easy-to-use technology can be quickly deployed to protect users, data and applications from breaches, credential theft and account takeover. The Ann Arbor, Michigan-based company also has offices in San Mateo, California; Austin, Texas and London. Duo is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures. Try it for free at https://duo.com.
Two-Factor Authentication Evaluation Guide
In this guide, you'll get: -A comprehensive set of criteria to customise your evaluation to your organisation’s needs -An overview of the hidden costs of a two-factor solution and how to determine your return on investment (ROI) -And more
Two-Factor Authentication Evaluation Guide (2).pdf 3.55 MB
The Trouble With Phishing
Phishing is one of the most common threats hitting organisations. This guide details the problems around phishing, how it works, and how Duo can be leveraged as a solution.
the-trouble-with-phishing-guide (1).pdf 438.74 kB
The 2017 Duo Trusted Access Report - The Current State of Enterprise Endpoint Security
The enterprise perimeter has been redefined by new networking models – and with new tech, come new security risks.
duo-trusted-access-report-2017 (2).pdf 2.02 MB
Moving Beyond the Perimeter_ Part 1
The Theory Behind Google’s BeyondCorp Security Model
Moving Beyond the Perimeter_ Part 1.pdf 324.00 kB
Moving Beyond the Perimeter_ Part 2
How To Implement The BeyondCorp Security Model
moving-beyond-the-perimeter-part-2.pdf 302.61 kB